Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ent's effort to avoid a transaction. See Baum, supra note 16, at 6 (1994). See Guideline 1.20 (nonrepudiation), particularly Comment 1.20.1. ...
    236 bytes (29 words) - 12:33, 16 October 2014
  • ==See Also== ...
    510 bytes (66 words) - 22:59, 1 November 2012
  • ...ic examination of the advantages and disadvantages of formal requirements, see Jhering, supra note 5, at 470-504. ...
    787 bytes (112 words) - 12:40, 16 October 2014
  • 2
    See, e.g., U. C. C. § 1-201(39) (1992). ...
    55 bytes (8 words) - 12:37, 16 October 2014
  • It also provides guidance to those advising, informing, or assisting directors. ==See also== ...
    1 KB (147 words) - 12:21, 2 May 2010
  • ...which provides assurance that the information signed has not been altered. See Guideline 35 (authentication). ...
    205 bytes (26 words) - 12:28, 16 October 2014
  • == See also == ...
    2 KB (237 words) - 11:16, 27 October 2012
  • See generally Ford, supra note 16, at 71-75; Charlie Kaufman, Radia Perlman & M ...
    230 bytes (29 words) - 12:38, 16 October 2014
  • == See also == ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...saction is a license of intellectual property rather than a sale of goods. See Softman Products Co., LLC v. Adobe Sys., Inc., 171 F. Supp. 2d 1075 (C.D. C ...dify [[Uniform Commercial Code]], by introducing new article (Article 2B), also known as UCC2B. ...
    2 KB (317 words) - 11:12, 30 October 2011
  • ...izations or even deny them access for not meeting network operating rules. Also, if fraud occurs and your organization has not completed the audit requirem ==See Also== ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ...have demonstrated a purpose to thwart interception by changing facilities. See United States v. Gaytan, 74 F.3d 545 (5th Cir. 1996); United States v. Pett ...l, an Assistant Attorney General, or an Acting Assistant Attorney General. See 18 U.S.C. § 2518(11)(a)(i) and (b)(i). ...
    2 KB (239 words) - 14:57, 21 May 2010
  • ==See also== ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and S ...
    394 bytes (48 words) - 12:36, 16 October 2014
  • See generally Ford, supra note 16, at 75-84. Computer Communications Security 7 ...
    363 bytes (43 words) - 12:40, 16 October 2014
  • 1
    ...g assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication). ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • == See also == ...
    2 KB (298 words) - 14:25, 23 April 2010
  • *'''XML E-Billing version 2''', ratified in 2006 but yet to see adoption, is intended to improve upon LEDES 2000. == See also == ...
    3 KB (412 words) - 11:45, 27 August 2011
  • ...assessed both currently and in the light of future technological advance. See generally, Schneier, supra note 18, at § 7.5, 166-67. ...
    402 bytes (62 words) - 12:39, 16 October 2014
  • :Section 101(c)(1)(C) states that the consumer also ''"consent electronically, in a manner that reasonably demonstrates that th ==See also== ...
    3 KB (456 words) - 11:26, 30 October 2011
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)